Good ICT practice requires that cybersecurity trends are followed and that protective measures are selected according to risk exposure. In practice, this selection is usually a compromise between technological requirements, usability and budgetary constraints. It is important to remember that digital security is a constant “arms race” in which the number of potential attack vectors and breaches increases in direct proportion to overall development and technological leaps. So-called bad actors in the ICT world are familiarizing themselves with all the latest innovations and trying to use them to achieve their goals (example: supporting artificial intelligence for offensive actions).
The range of defensive measures that ensure business continuity and protect against breaches of data integrity (and confidentiality) is constantly growing. Their use determines the ability to avoid the growing cyber threat. They are complemented by measures to build digital resilience, i.e. the ability to limit the damage if the security of the ICT system is nevertheless compromised. Cyber resilience addresses all external and internal threats and requires an understanding that no digital protection system is perfect (even with full vendor support and installation of updates).In summary, cybersecurity techniques aim to minimize the risk of an attack, and a cyber resilience strategy includes measures to minimize the impact of attacks. The more closely these two categories are linked, the more comprehensive an organization’s approach to ICT security will be.